Information and Network Security

Information and Network Security

University

15 Qs

Similar activities

31-45

31-45

University

15 Qs

No 52 GDPR and data loss

No 52 GDPR and data loss

12th Grade - University

15 Qs

Cybersecurity Terms Quiz

Cybersecurity Terms Quiz

University

10 Qs

Responses to the Environment

Responses to the Environment

4th Grade - University

15 Qs

Anxiety Term quiz

Anxiety Term quiz

University

10 Qs

Research Methods in Sociology

Research Methods in Sociology

12th Grade - University

15 Qs

PSYCHIATRY QUIZ - THERAPEUTIC COMMUNICATION

PSYCHIATRY QUIZ - THERAPEUTIC COMMUNICATION

University

12 Qs

OREN 329.03

OREN 329.03

5th Grade - University

12 Qs

Information and Network Security

Information and Network Security

Assessment

Quiz

Created by

Pratibha Jadhav

Science

University

4 plays

Hard

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is information Security ?

About securing information from unauthorized access.

vulnerability protection that comes in the form of a physical device rather than software

refers to the range of tools, controls, and measures designed to establish and preserve database confidentiality

refers to specified steps or measures used to protect the OS from threats, viruses, worms, malware or remote hacker intrusions.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

DOS stand for _____

denial of service

daniel of service

do on schedule

dont open the slot

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is mean by one party cannot deny receiving a message or a transaction nor can the other party deny sending a message or a transaction?
Non-repudiation
Confidentiality
Integrity
Availability

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the formula for Decryption in Caesar Cipher?
p=(c-k) mod 26
c=p+k
c=(p+k) mod 26
p=c-k

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In a(n) …...........cipher, the same key is used by both sender and receiver.
A Symmetric-Key
An Asymmetric-key
Both symmetric and asymmetric
none of the mentioned

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

…........... means information is not disclosed to unauthorized individuals, entities and process. 
Confidentiality
Non -Repudiation
Availabilty
Integrity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An Attack which involves modification of Data is known as _____.
active attack
passive attack
security attack
threat attack

8.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A ------ takes place when one entity pretends to be a different entity It includes one of the other forms of active attack.
Masquerade
Replay
Release of message
Availabilty

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

…....... are symmetric algorithms.
Playfair
Ceasar
Vernam
All

10.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Vernam is …................. Cipher.
Stream
Block
Both of the mentioned
none of the mentioned

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?